Home | History | Annotate | Download | only in v8
      1 /*
      2  * Copyright (C) 2008, 2009, 2011 Google Inc. All rights reserved.
      3  *
      4  * Redistribution and use in source and binary forms, with or without
      5  * modification, are permitted provided that the following conditions are
      6  * met:
      7  *
      8  *     * Redistributions of source code must retain the above copyright
      9  * notice, this list of conditions and the following disclaimer.
     10  *     * Redistributions in binary form must reproduce the above
     11  * copyright notice, this list of conditions and the following disclaimer
     12  * in the documentation and/or other materials provided with the
     13  * distribution.
     14  *     * Neither the name of Google Inc. nor the names of its
     15  * contributors may be used to endorse or promote products derived from
     16  * this software without specific prior written permission.
     17  *
     18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
     19  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
     20  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
     21  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
     22  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
     23  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
     24  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     25  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     26  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     27  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
     28  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     29  */
     30 
     31 #include "config.h"
     32 #include "bindings/core/v8/WindowProxy.h"
     33 
     34 #include "bindings/core/v8/DOMWrapperWorld.h"
     35 #include "bindings/core/v8/ScriptController.h"
     36 #include "bindings/core/v8/V8Binding.h"
     37 #include "bindings/core/v8/V8DOMActivityLogger.h"
     38 #include "bindings/core/v8/V8Document.h"
     39 #include "bindings/core/v8/V8GCForContextDispose.h"
     40 #include "bindings/core/v8/V8HTMLCollection.h"
     41 #include "bindings/core/v8/V8HTMLDocument.h"
     42 #include "bindings/core/v8/V8HiddenValue.h"
     43 #include "bindings/core/v8/V8Initializer.h"
     44 #include "bindings/core/v8/V8ObjectConstructor.h"
     45 #include "bindings/core/v8/V8Window.h"
     46 #include "core/frame/LocalFrame.h"
     47 #include "core/frame/csp/ContentSecurityPolicy.h"
     48 #include "core/html/DocumentNameCollection.h"
     49 #include "core/html/HTMLCollection.h"
     50 #include "core/html/HTMLIFrameElement.h"
     51 #include "core/inspector/InspectorInstrumentation.h"
     52 #include "core/loader/DocumentLoader.h"
     53 #include "core/loader/FrameLoader.h"
     54 #include "core/loader/FrameLoaderClient.h"
     55 #include "platform/RuntimeEnabledFeatures.h"
     56 #include "platform/ScriptForbiddenScope.h"
     57 #include "platform/TraceEvent.h"
     58 #include "platform/heap/Handle.h"
     59 #include "platform/weborigin/SecurityOrigin.h"
     60 #include "public/platform/Platform.h"
     61 #include "wtf/Assertions.h"
     62 #include "wtf/OwnPtr.h"
     63 #include "wtf/StringExtras.h"
     64 #include "wtf/text/CString.h"
     65 #include <algorithm>
     66 #include <utility>
     67 #include <v8-debug.h>
     68 #include <v8.h>
     69 
     70 namespace blink {
     71 
     72 static void checkDocumentWrapper(v8::Handle<v8::Object> wrapper, Document* document)
     73 {
     74     ASSERT(V8Document::toImpl(wrapper) == document);
     75     ASSERT(!document->isHTMLDocument() || (V8Document::toImpl(v8::Handle<v8::Object>::Cast(wrapper->GetPrototype())) == document));
     76 }
     77 
     78 PassOwnPtr<WindowProxy> WindowProxy::create(LocalFrame* frame, DOMWrapperWorld& world, v8::Isolate* isolate)
     79 {
     80     return adoptPtr(new WindowProxy(frame, &world, isolate));
     81 }
     82 
     83 WindowProxy::WindowProxy(LocalFrame* frame, PassRefPtr<DOMWrapperWorld> world, v8::Isolate* isolate)
     84     : m_frame(frame)
     85     , m_isolate(isolate)
     86     , m_world(world)
     87 {
     88 }
     89 
     90 void WindowProxy::disposeContext(GlobalDetachmentBehavior behavior)
     91 {
     92     if (!isContextInitialized())
     93         return;
     94 
     95     v8::HandleScope handleScope(m_isolate);
     96     v8::Handle<v8::Context> context = m_scriptState->context();
     97     m_frame->loader().client()->willReleaseScriptContext(context, m_world->worldId());
     98 
     99     if (behavior == DetachGlobal)
    100         m_scriptState->detachGlobalObject();
    101 
    102     m_scriptState->disposePerContextData();
    103 
    104     // It's likely that disposing the context has created a lot of
    105     // garbage. Notify V8 about this so it'll have a chance of cleaning
    106     // it up when idle.
    107     V8GCForContextDispose::instanceTemplate().notifyContextDisposed(m_frame->isMainFrame());
    108 }
    109 
    110 void WindowProxy::clearForClose()
    111 {
    112     if (!isContextInitialized())
    113         return;
    114 
    115     m_document.clear();
    116     disposeContext(DoNotDetachGlobal);
    117 }
    118 
    119 void WindowProxy::clearForNavigation()
    120 {
    121     if (!isContextInitialized())
    122         return;
    123 
    124     ScriptState::Scope scope(m_scriptState.get());
    125 
    126     m_document.clear();
    127 
    128     // Clear the document wrapper cache before turning on access checks on
    129     // the old LocalDOMWindow wrapper. This way, access to the document wrapper
    130     // will be protected by the security checks on the LocalDOMWindow wrapper.
    131     clearDocumentProperty();
    132 
    133     v8::Handle<v8::Object> windowWrapper = V8Window::findInstanceInPrototypeChain(m_global.newLocal(m_isolate), m_isolate);
    134     ASSERT(!windowWrapper.IsEmpty());
    135     windowWrapper->TurnOnAccessCheck();
    136     disposeContext(DetachGlobal);
    137 }
    138 
    139 // Create a new environment and setup the global object.
    140 //
    141 // The global object corresponds to a LocalDOMWindow instance. However, to
    142 // allow properties of the JS LocalDOMWindow instance to be shadowed, we
    143 // use a shadow object as the global object and use the JS LocalDOMWindow
    144 // instance as the prototype for that shadow object. The JS LocalDOMWindow
    145 // instance is undetectable from JavaScript code because the __proto__
    146 // accessors skip that object.
    147 //
    148 // The shadow object and the LocalDOMWindow instance are seen as one object
    149 // from JavaScript. The JavaScript object that corresponds to a
    150 // LocalDOMWindow instance is the shadow object. When mapping a LocalDOMWindow
    151 // instance to a V8 object, we return the shadow object.
    152 //
    153 // To implement split-window, see
    154 //   1) https://bugs.webkit.org/show_bug.cgi?id=17249
    155 //   2) https://wiki.mozilla.org/Gecko:SplitWindow
    156 //   3) https://bugzilla.mozilla.org/show_bug.cgi?id=296639
    157 // we need to split the shadow object further into two objects:
    158 // an outer window and an inner window. The inner window is the hidden
    159 // prototype of the outer window. The inner window is the default
    160 // global object of the context. A variable declared in the global
    161 // scope is a property of the inner window.
    162 //
    163 // The outer window sticks to a LocalFrame, it is exposed to JavaScript
    164 // via window.window, window.self, window.parent, etc. The outer window
    165 // has a security token which is the domain. The outer window cannot
    166 // have its own properties. window.foo = 'x' is delegated to the
    167 // inner window.
    168 //
    169 // When a frame navigates to a new page, the inner window is cut off
    170 // the outer window, and the outer window identify is preserved for
    171 // the frame. However, a new inner window is created for the new page.
    172 // If there are JS code holds a closure to the old inner window,
    173 // it won't be able to reach the outer window via its global object.
    174 bool WindowProxy::initializeIfNeeded()
    175 {
    176     if (isContextInitialized())
    177         return true;
    178 
    179     DOMWrapperWorld::setWorldOfInitializingWindow(m_world.get());
    180     bool result = initialize();
    181     DOMWrapperWorld::setWorldOfInitializingWindow(0);
    182     return result;
    183 }
    184 
    185 bool WindowProxy::initialize()
    186 {
    187     TRACE_EVENT0("v8", "WindowProxy::initialize");
    188     TRACE_EVENT_SCOPED_SAMPLING_STATE("blink", "InitializeWindow");
    189 
    190     ScriptForbiddenScope::AllowUserAgentScript allowScript;
    191 
    192     v8::HandleScope handleScope(m_isolate);
    193 
    194     createContext();
    195 
    196     if (!isContextInitialized())
    197         return false;
    198 
    199     ScriptState::Scope scope(m_scriptState.get());
    200     v8::Handle<v8::Context> context = m_scriptState->context();
    201     if (m_global.isEmpty()) {
    202         m_global.set(m_isolate, context->Global());
    203         if (m_global.isEmpty()) {
    204             disposeContext(DoNotDetachGlobal);
    205             return false;
    206         }
    207     }
    208 
    209     if (!installDOMWindow()) {
    210         disposeContext(DoNotDetachGlobal);
    211         return false;
    212     }
    213 
    214     if (m_world->isMainWorld()) {
    215         // ActivityLogger for main world is updated within updateDocument().
    216         updateDocument();
    217         if (m_frame->document()) {
    218             setSecurityToken(m_frame->document()->securityOrigin());
    219             ContentSecurityPolicy* csp = m_frame->document()->contentSecurityPolicy();
    220             context->AllowCodeGenerationFromStrings(csp->allowEval(0, ContentSecurityPolicy::SuppressReport));
    221             context->SetErrorMessageForCodeGenerationFromStrings(v8String(m_isolate, csp->evalDisabledErrorMessage()));
    222         }
    223     } else {
    224         updateActivityLogger();
    225         SecurityOrigin* origin = m_world->isolatedWorldSecurityOrigin();
    226         setSecurityToken(origin);
    227         if (origin && InspectorInstrumentation::hasFrontends()) {
    228             InspectorInstrumentation::didCreateIsolatedContext(m_frame, m_scriptState.get(), origin);
    229         }
    230     }
    231     m_frame->loader().client()->didCreateScriptContext(context, m_world->extensionGroup(), m_world->worldId());
    232     return true;
    233 }
    234 
    235 void WindowProxy::createContext()
    236 {
    237     // The documentLoader pointer could be 0 during frame shutdown.
    238     // FIXME: Can we remove this check?
    239     if (!m_frame->loader().documentLoader())
    240         return;
    241 
    242     // Create a new environment using an empty template for the shadow
    243     // object. Reuse the global object if one has been created earlier.
    244     v8::Handle<v8::ObjectTemplate> globalTemplate = V8Window::getShadowObjectTemplate(m_isolate);
    245     if (globalTemplate.IsEmpty())
    246         return;
    247 
    248     double contextCreationStartInSeconds = currentTime();
    249 
    250     // Dynamically tell v8 about our extensions now.
    251     const V8Extensions& extensions = ScriptController::registeredExtensions();
    252     OwnPtr<const char*[]> extensionNames = adoptArrayPtr(new const char*[extensions.size()]);
    253     int index = 0;
    254     int extensionGroup = m_world->extensionGroup();
    255     int worldId = m_world->worldId();
    256     for (size_t i = 0; i < extensions.size(); ++i) {
    257         if (!m_frame->loader().client()->allowScriptExtension(extensions[i]->name(), extensionGroup, worldId))
    258             continue;
    259 
    260         extensionNames[index++] = extensions[i]->name();
    261     }
    262     v8::ExtensionConfiguration extensionConfiguration(index, extensionNames.get());
    263 
    264     v8::Handle<v8::Context> context = v8::Context::New(m_isolate, &extensionConfiguration, globalTemplate, m_global.newLocal(m_isolate));
    265     if (context.IsEmpty())
    266         return;
    267     m_scriptState = ScriptState::create(context, m_world);
    268 
    269     double contextCreationDurationInMilliseconds = (currentTime() - contextCreationStartInSeconds) * 1000;
    270     const char* histogramName = "WebCore.WindowProxy.createContext.MainWorld";
    271     if (!m_world->isMainWorld())
    272         histogramName = "WebCore.WindowProxy.createContext.IsolatedWorld";
    273     blink::Platform::current()->histogramCustomCounts(histogramName, contextCreationDurationInMilliseconds, 0, 10000, 50);
    274 }
    275 
    276 static v8::Handle<v8::Object> toInnerGlobalObject(v8::Handle<v8::Context> context)
    277 {
    278     return v8::Handle<v8::Object>::Cast(context->Global()->GetPrototype());
    279 }
    280 
    281 bool WindowProxy::installDOMWindow()
    282 {
    283     LocalDOMWindow* window = m_frame->domWindow();
    284     const WrapperTypeInfo* wrapperTypeInfo = window->wrapperTypeInfo();
    285     v8::Local<v8::Object> windowWrapper = V8ObjectConstructor::newInstance(m_isolate, m_scriptState->perContextData()->constructorForType(wrapperTypeInfo));
    286     if (windowWrapper.IsEmpty())
    287         return false;
    288 
    289     V8DOMWrapper::setNativeInfoForHiddenWrapper(v8::Handle<v8::Object>::Cast(windowWrapper->GetPrototype()), wrapperTypeInfo, window->toScriptWrappableBase());
    290 
    291     // Install the windowWrapper as the prototype of the innerGlobalObject.
    292     // The full structure of the global object is as follows:
    293     //
    294     // outerGlobalObject (Empty object, remains after navigation)
    295     //   -- has prototype --> innerGlobalObject (Holds global variables, changes during navigation)
    296     //   -- has prototype --> LocalDOMWindow instance
    297     //   -- has prototype --> Window.prototype
    298     //   -- has prototype --> Object.prototype
    299     //
    300     // Note: Much of this prototype structure is hidden from web content. The
    301     //       outer, inner, and LocalDOMWindow instance all appear to be the same
    302     //       JavaScript object.
    303     //
    304     // Note: With Oilpan, the LocalDOMWindow object is garbage collected.
    305     //       Persistent references to this inner global object view of the LocalDOMWindow
    306     //       aren't kept, as that would prevent the global object from ever being released.
    307     //       It is safe not to do so, as the wrapper for the LocalDOMWindow being installed here
    308     //       already keeps a persistent reference, and it along with the inner global object
    309     //       views of the LocalDOMWindow will die together once that wrapper clears the persistent
    310     //       reference.
    311     v8::Handle<v8::Object> innerGlobalObject = toInnerGlobalObject(m_scriptState->context());
    312     V8DOMWrapper::setNativeInfoForHiddenWrapper(innerGlobalObject, wrapperTypeInfo, window->toScriptWrappableBase());
    313     innerGlobalObject->SetPrototype(windowWrapper);
    314     V8DOMWrapper::associateObjectWithWrapperNonTemplate(window, wrapperTypeInfo, windowWrapper, m_isolate);
    315     wrapperTypeInfo->installConditionallyEnabledProperties(windowWrapper, m_isolate);
    316     return true;
    317 }
    318 
    319 void WindowProxy::updateDocumentWrapper(v8::Handle<v8::Object> wrapper)
    320 {
    321     ASSERT(m_world->isMainWorld());
    322     m_document.set(m_isolate, wrapper);
    323 }
    324 
    325 void WindowProxy::updateDocumentProperty()
    326 {
    327     if (!m_world->isMainWorld())
    328         return;
    329 
    330     ScriptState::Scope scope(m_scriptState.get());
    331     v8::Handle<v8::Context> context = m_scriptState->context();
    332     v8::Handle<v8::Value> documentWrapper = toV8(m_frame->document(), context->Global(), context->GetIsolate());
    333     ASSERT(documentWrapper == m_document.newLocal(m_isolate) || m_document.isEmpty());
    334     if (m_document.isEmpty())
    335         updateDocumentWrapper(v8::Handle<v8::Object>::Cast(documentWrapper));
    336     checkDocumentWrapper(m_document.newLocal(m_isolate), m_frame->document());
    337 
    338     // If instantiation of the document wrapper fails, clear the cache
    339     // and let the LocalDOMWindow accessor handle access to the document.
    340     if (documentWrapper.IsEmpty()) {
    341         clearDocumentProperty();
    342         return;
    343     }
    344     ASSERT(documentWrapper->IsObject());
    345     context->Global()->ForceSet(v8AtomicString(m_isolate, "document"), documentWrapper, static_cast<v8::PropertyAttribute>(v8::ReadOnly | v8::DontDelete));
    346 
    347     // We also stash a reference to the document on the inner global object so that
    348     // LocalDOMWindow objects we obtain from JavaScript references are guaranteed to have
    349     // live Document objects.
    350     V8HiddenValue::setHiddenValue(m_isolate, toInnerGlobalObject(context), V8HiddenValue::document(m_isolate), documentWrapper);
    351 }
    352 
    353 void WindowProxy::clearDocumentProperty()
    354 {
    355     ASSERT(isContextInitialized());
    356     if (!m_world->isMainWorld())
    357         return;
    358     v8::HandleScope handleScope(m_isolate);
    359     m_scriptState->context()->Global()->ForceDelete(v8AtomicString(m_isolate, "document"));
    360 }
    361 
    362 void WindowProxy::updateActivityLogger()
    363 {
    364     m_scriptState->perContextData()->setActivityLogger(V8DOMActivityLogger::activityLogger(
    365         m_world->worldId(), m_frame->document() ? m_frame->document()->baseURI() : KURL()));
    366 }
    367 
    368 void WindowProxy::setSecurityToken(SecurityOrigin* origin)
    369 {
    370     // If two tokens are equal, then the SecurityOrigins canAccess each other.
    371     // If two tokens are not equal, then we have to call canAccess.
    372     // Note: we can't use the HTTPOrigin if it was set from the DOM.
    373     String token;
    374     // We stick with an empty token if document.domain was modified or if we
    375     // are in the initial empty document, so that we can do a full canAccess
    376     // check in those cases.
    377     bool delaySet = m_world->isMainWorld()
    378         && (origin->domainWasSetInDOM()
    379             || m_frame->loader().stateMachine()->isDisplayingInitialEmptyDocument());
    380     if (origin && !delaySet)
    381         token = origin->toString();
    382 
    383     // An empty or "null" token means we always have to call
    384     // canAccess. The toString method on securityOrigins returns the
    385     // string "null" for empty security origins and for security
    386     // origins that should only allow access to themselves. In this
    387     // case, we use the global object as the security token to avoid
    388     // calling canAccess when a script accesses its own objects.
    389     v8::HandleScope handleScope(m_isolate);
    390     v8::Handle<v8::Context> context = m_scriptState->context();
    391     if (token.isEmpty() || token == "null") {
    392         context->UseDefaultSecurityToken();
    393         return;
    394     }
    395 
    396     if (m_world->isPrivateScriptIsolatedWorld())
    397         token = "private-script://" + token;
    398 
    399     CString utf8Token = token.utf8();
    400     // NOTE: V8 does identity comparison in fast path, must use a symbol
    401     // as the security token.
    402     context->SetSecurityToken(v8AtomicString(m_isolate, utf8Token.data(), utf8Token.length()));
    403 }
    404 
    405 void WindowProxy::updateDocument()
    406 {
    407     ASSERT(m_world->isMainWorld());
    408     if (!isGlobalInitialized())
    409         return;
    410     if (!isContextInitialized())
    411         return;
    412     updateActivityLogger();
    413     updateDocumentProperty();
    414     updateSecurityOrigin(m_frame->document()->securityOrigin());
    415 }
    416 
    417 static v8::Handle<v8::Value> getNamedProperty(HTMLDocument* htmlDocument, const AtomicString& key, v8::Handle<v8::Object> creationContext, v8::Isolate* isolate)
    418 {
    419     if (!htmlDocument->hasNamedItem(key) && !htmlDocument->hasExtraNamedItem(key))
    420         return v8Undefined();
    421 
    422     RefPtrWillBeRawPtr<DocumentNameCollection> items = htmlDocument->documentNamedItems(key);
    423     if (items->isEmpty())
    424         return v8Undefined();
    425 
    426     if (items->hasExactlyOneItem()) {
    427         HTMLElement* element = items->item(0);
    428         ASSERT(element);
    429         Frame* frame = isHTMLIFrameElement(*element) ? toHTMLIFrameElement(*element).contentFrame() : 0;
    430         if (frame)
    431             return toV8(frame->domWindow(), creationContext, isolate);
    432         return toV8(element, creationContext, isolate);
    433     }
    434     return toV8(PassRefPtrWillBeRawPtr<HTMLCollection>(items.release()), creationContext, isolate);
    435 }
    436 
    437 static void getter(v8::Local<v8::String> property, const v8::PropertyCallbackInfo<v8::Value>& info)
    438 {
    439     // FIXME: Consider passing StringImpl directly.
    440     AtomicString name = toCoreAtomicString(property);
    441     HTMLDocument* htmlDocument = V8HTMLDocument::toImpl(info.Holder());
    442     ASSERT(htmlDocument);
    443     v8::Handle<v8::Value> result = getNamedProperty(htmlDocument, name, info.Holder(), info.GetIsolate());
    444     if (!result.IsEmpty()) {
    445         v8SetReturnValue(info, result);
    446         return;
    447     }
    448     v8::Handle<v8::Value> prototype = info.Holder()->GetPrototype();
    449     if (prototype->IsObject()) {
    450         v8SetReturnValue(info, prototype.As<v8::Object>()->Get(property));
    451         return;
    452     }
    453 }
    454 
    455 void WindowProxy::namedItemAdded(HTMLDocument* document, const AtomicString& name)
    456 {
    457     ASSERT(m_world->isMainWorld());
    458 
    459     if (!isContextInitialized())
    460         return;
    461 
    462     ScriptState::Scope scope(m_scriptState.get());
    463     ASSERT(!m_document.isEmpty());
    464     v8::Handle<v8::Object> documentHandle = m_document.newLocal(m_isolate);
    465     checkDocumentWrapper(documentHandle, document);
    466     documentHandle->SetAccessor(v8String(m_isolate, name), getter);
    467 }
    468 
    469 void WindowProxy::namedItemRemoved(HTMLDocument* document, const AtomicString& name)
    470 {
    471     ASSERT(m_world->isMainWorld());
    472 
    473     if (!isContextInitialized())
    474         return;
    475 
    476     if (document->hasNamedItem(name) || document->hasExtraNamedItem(name))
    477         return;
    478 
    479     ScriptState::Scope scope(m_scriptState.get());
    480     ASSERT(!m_document.isEmpty());
    481     v8::Handle<v8::Object> documentHandle = m_document.newLocal(m_isolate);
    482     checkDocumentWrapper(documentHandle, document);
    483     documentHandle->Delete(v8String(m_isolate, name));
    484 }
    485 
    486 void WindowProxy::updateSecurityOrigin(SecurityOrigin* origin)
    487 {
    488     ASSERT(m_world->isMainWorld());
    489     if (!isContextInitialized())
    490         return;
    491     setSecurityToken(origin);
    492 }
    493 
    494 } // namespace blink
    495